語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Building an intelligence-led securit...
~
Gallo, Tim,
Building an intelligence-led security program
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Building an intelligence-led security programAllan Liska ; Tim Gallo, technical editor.
作者:
Liska, Allan,
其他作者:
Gallo, Tim,
出版者:
Amsterdam :Elsevier,2015.
面頁冊數:
1 online resource (xv, 175 p.) :ill.
標題:
Computer networksSecurity measures.
電子資源:
https://www.sciencedirect.com/science/book/9780128021453
ISBN:
9780128023709 (electronic bk.)
Building an intelligence-led security program
Liska, Allan,
Building an intelligence-led security program
[electronic resource] /Allan Liska ; Tim Gallo, technical editor. - Amsterdam :Elsevier,2015. - 1 online resource (xv, 175 p.) :ill.
Includes bibliographical references and index.
Understanding the threat -- What is intelligence? -- Building a network security intelligence model -- Gathering data -- Internal intelligence sources -- External intelligence sources -- Fusing internal and external intelligence -- CERTs, ISACs, and intelligencec-sharing communities -- Advanced intelligence capabilities.
As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way. Provides a roadmap and direction on how to build an intelligence-led information security program to protect your company. Learn how to understand your network through logs and client monitoring, so you can effectively evaluate threat intelligence. Learn how to use popular tools such as BIND, SNORT, squid, STIX, TAXII, CyBox, and splunk to conduct network intelligence.
ISBN: 9780128023709 (electronic bk.)Subjects--Topical Terms:
185597
Computer networks
--Security measures.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: TK5105.59 / .L57 2015eb
Dewey Class. No.: 658.478
Building an intelligence-led security program
LDR
:03180cmm a2200301 a 4500
001
582197
006
o d
007
cnu|unuuu||
008
210121s2015 ne a ob 001 0 eng d
020
$a
9780128023709 (electronic bk.)
020
$a
0128023708 (electronic bk.)
020
$a
9781322480787 (electronic bk.)
020
$a
1322480788 (electronic bk.)
020
$a
9780128021453
020
$a
0128021454
035
$a
(OCoLC)898326670
035
$a
EL2020117
040
$a
IDEBK
$b
eng
$c
IDEBK
$d
EBLCP
$d
N
$d
UIU
$d
OCLCF
$d
TEFOD
$d
DEBSZ
$d
TEFOD
$d
DEBBG
$d
OCLCQ
$d
OSU
$d
FEM
$d
MERUC
$d
OCLCQ
$d
U3W
$d
D6H
$d
OCLCQ
$d
CUY
$d
ZCU
$d
ICG
$d
DKC
$d
OCLCQ
$d
DCT
$d
OCLCQ
041
0
$a
eng
050
4
$a
TK5105.59
$b
.L57 2015eb
082
0 4
$a
658.478
$2
23
100
1
$a
Liska, Allan,
$e
author.
$3
872278
245
1 0
$a
Building an intelligence-led security program
$h
[electronic resource] /
$c
Allan Liska ; Tim Gallo, technical editor.
260
$a
Amsterdam :
$b
Elsevier,
$c
2015.
300
$a
1 online resource (xv, 175 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
Understanding the threat -- What is intelligence? -- Building a network security intelligence model -- Gathering data -- Internal intelligence sources -- External intelligence sources -- Fusing internal and external intelligence -- CERTs, ISACs, and intelligencec-sharing communities -- Advanced intelligence capabilities.
520
$a
As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents. The problem with current efforts is that many security practitioners don't know how to properly implement an intelligence-led program, or are afraid that it is out of their budget. Building an Intelligence-Led Security Program is the first book to show how to implement an intelligence-led program in your enterprise on any budget. It will show you how to implement a security information a security information and event management system, collect and analyze logs, and how to practice real cyber threat intelligence. You'll learn how to understand your network in-depth so that you can protect it in the best possible way. Provides a roadmap and direction on how to build an intelligence-led information security program to protect your company. Learn how to understand your network through logs and client monitoring, so you can effectively evaluate threat intelligence. Learn how to use popular tools such as BIND, SNORT, squid, STIX, TAXII, CyBox, and splunk to conduct network intelligence.
588
0
$a
Print version record.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
655
4
$a
Electronic books.
$2
local.
$3
214472
655
4
$a
Security; Information Technology.
$3
872280
700
1
$a
Gallo, Tim,
$e
editor.
$3
872279
856
4 0
$u
https://www.sciencedirect.com/science/book/9780128021453
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000187040
電子館藏
1圖書
電子書
EB TK5105.59 .L57 2015eb 2015
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://www.sciencedirect.com/science/book/9780128021453
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入